Catalog
Displaying 21 - 30 of 95 (page 3 of 10)
Title | Language | ILR | ACTFL | Modality | Type | |
---|---|---|---|---|---|---|
Practices for Protecting Data | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Promoting a Security Culture | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Protecting Ports from DDoS | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
The Problem with Parallel Permissions | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Preparing For and Conducting Audits | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Controlling Access through Segmentation | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
IAM in the Cloud | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
How to Keep Data Safe | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Tips for Effective Incident Response | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object | |
Parameters of Pen Testing | Chinese, Mandarin | 2+/3 | Superior | Reading | Language Learning Object |
Pagination